TWI289295B - Method for protecting content stored on an information carrier - Google Patents

Method for protecting content stored on an information carrier Download PDF

Info

Publication number
TWI289295B
TWI289295B TW091117882A TW91117882A TWI289295B TW I289295 B TWI289295 B TW I289295B TW 091117882 A TW091117882 A TW 091117882A TW 91117882 A TW91117882 A TW 91117882A TW I289295 B TWI289295 B TW I289295B
Authority
TW
Taiwan
Prior art keywords
information carrier
access
identifier
memory
information
Prior art date
Application number
TW091117882A
Other languages
Chinese (zh)
Inventor
Robert Albertus Brondijk
Maurice Jerome Justin Jea Maes
Original Assignee
Koninkl Philips Electronics Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB0116496A external-priority patent/GB0116496D0/en
Application filed by Koninkl Philips Electronics Nv filed Critical Koninkl Philips Electronics Nv
Application granted granted Critical
Publication of TWI289295B publication Critical patent/TWI289295B/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B19/00Driving, starting, stopping record carriers not specifically of filamentary or web form, or of supports therefor; Control thereof; Control of operating function ; Driving both disc and head
    • G11B19/02Control of operating function, e.g. switching from recording to reproducing
    • G11B19/12Control of operating function, e.g. switching from recording to reproducing by sensing distinguishing features of or on records, e.g. diameter end mark
    • G11B19/122Control of operating function, e.g. switching from recording to reproducing by sensing distinguishing features of or on records, e.g. diameter end mark involving the detection of an identification or authentication mark
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91328Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a copy management signal, e.g. a copy generation management signal [CGMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91335Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3246Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of data relating to permitted access or usage, e.g. level of access or usage parameters for digital rights management [DRM] related to still images
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/84Television signal recording using optical recording
    • H04N5/85Television signal recording using optical recording on discs or drums

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Television Signal Processing For Recording (AREA)

Abstract

The invention relates to a method for protecting content stored on an information carrier. In order to avoid that a user illegally circumvents a copy protection mechanism such as a watermark protecting said content to get an illegal access to said content, a method comprising the following steps is proposed: reading a unique identifier present on said information carrier, storing in a first memory information relating to illegal access actions on said information carrier using said identifier, refusing access to said information carrier after a predetermined number of illegal access actions.

Description

12892951289295

本發明關於保護儲存於一資訊載體中内容之方法及對應之裝置 關於實施此方法之電腦程式及關於儲存電腦程式之資訊栽體义。 目刖,I入資料(亦稱為“數位水印”)為一種技術,用以將 製控制資訊嵌人-有版權之材料,如音樂,電影及各種音類視頻 作品。水印可被嵌入一音頻或視頻流中。 此等水印可代表資訊,其指出嵌入水印之内容,為永遠不能複 ,在可移動之光學媒鱧上,或指出内容不能以未加密方式出現在 可移動光學媒體上。例如,在可記錄DVD磁碟上未加密之内容之 永不能複製”視頻水印可能為非法,亦可能導致拒絕由一般播放 器回放該内容。另一例為,一音頻水印,其指出内容僅能以加密 方式記錄,以便用以防止將音頻内容記錄在CD-RW,可再寫入之 DVD或其他型式之光學磁碟上。 數位水印技術典型需要在可靠之偵測可能之前,大量資料必須 檢查。可能發生數秒鐘之音頻或視頻作品或自其演繹之作品即被 “累加”,而偵測實施在累加之資料上。 在有版權之資料中嵌入資料之方法,曾揭示於國際專利申請w〇 99/45705中,該文件以參考方式併入此間。精於此技藝人士甚為 熟悉現有之嵌入資料之技術(或水印),本發明無關於嵌入資料技 術,故無進一步之資料。 在一PC環境中播放控制及記錄控制之實際實施中,本發明人發 現數個與PC驅動機之特殊操作有關之問題,及與用戶可控制驅動 機操作之事實。 發明人發現之第一個問題為用戶可發出多個“讀取,,指令至驅動 機以試圖繞行播放控制,直到發現水印(WM)為止。當已發現水印 -4- 本紙張尺度適用中國國家標準(CNS) A4規格(210x 297公釐) 1289295 A7 B7 五、發明説明(2 ) ,“讀取”被中斷,用戶可自同一磁碟開始一新“讀取”指令。因為 水印偵測需要讀取大量(秒)資料,此種攻擊為可能的。同理,為 記錄控制,“寫入”指令可發出,直到偵出水印,但中斷後,方法 可繼績。 本發明人發現之第二個問題為,驅動機不需順序“讀取”或“寫 入”音頻視頻資訊,但驅動機可以隨機順序處理自一音頻視頻工作 之隨機部分。 - 本發明人發現之第三個問題為,利用内容之短小部分之交互 “讀取”及“寫入”行動可能讀取或寫入保護之資料,因其太短無法 偵出水印。在直接實施中,一驅動機需要二水印偵測器,因而甚 為昂貴,或需要每一讀取及寫入行動後再設定,因此造成所述之 駭客行為。 本發明之目的為克服發明人所發現之問題,特別是第一個問題 ,以避免用戶法繞行一複製保護機構,如水印保護該内容,及防 止其非法存取該内容。 本發明目的之達成係根據申請專利範圍第1項所述之方法,方法 含下列步驟: -讀取一存在於資訊載體中之獨特識別符, -利用該識別符將與在該資訊載體上之非法存取行動有關 之資訊儲存於第一記憶體, -在預定數目之非法存取行動後,拒絕該資訊載體之存取。 本發明係根據一概念,即防止以多次“讀取”或多次“寫入”方式-非法侵入,一項事實可以利用,即資訊載體如可記錄磁碟,有許 多獨特號碼(即CD-R,DVD-RAM,DVD-RW,DVD+RW),其可被用 -5- 本紙張尺度適用中國國家標準(CNS) A4規格(210 X 297公釐) 1289295 A7 B7 五、發明説明 為獨特識別符。每次遭遇-非法讀取或寫人時,此符被儲存在第 一記憶體t ,其較佳位於PC驅動機。在N次非法行動後(Nu),驅 動機可拒絕自該資訊載體讀取資料及/或寫入資料至該資訊載體。 以此方式,±述之第-個問題可以防止,gp,摘出一誤差情形 後,重複發出讀取或寫入指令。僅可能重複發出此等指令有限之 次數,故僅能防止有限之資料被非法摘取。 本發明較佳實施例限定於附屬申請專利範圍中。 訂 根據第-個較佳實施例’儲存曾發生非法存取之資訊載體識別 符之第二記憶體用以檢查資訊載體之識別符是否儲存於其中。此 情形下,出現在該資訊載體上非法存取之次數餘存在卜記憶想 中,該次數增加。在該識別符未儲存於第二記憶體時,在第二記 憶想中設置i ’在資訊載艘上發生之非法存取次數將被連續登 記在第一記憶體中。因此,對每一個別資訊載體而言,在第二記 憶體中保持一單獨寄存器以儲存在該資訊載體發生二 次數,因而可檢查該個別資訊載體是否能被用戶存取與否。 根據另一較佳實施例,儲存於資訊載體中之嵌入内容中之複製 保護資料,被用來控制對内容之存取。特別是,水印資料用以作 為複製保護資料,其可被水印偵測器用以檢查是否出現一誤差情 形,即,非法存取行動。該複製保護資料包含資訊,其指出儲^ 在資訊載體之内容如何及多久可被複製及被讀取,S其可被寫入 資訊載想。通常,_容之任何特殊存取可糾該複製保護資料控 制。 建議之解決方案可用於所有但不限於所有能自―資訊載艘讀取 或寫入資料之PC媒動機’特別是可記錄或可再寫人之光學記錄載 -6 -The present invention relates to a method for protecting content stored in an information carrier and a corresponding device. The computer program for implementing the method and the information about storing the computer program. It is seen that I-input data (also known as "digital watermarks") is a technique used to embed control information into copyrighted materials such as music, movies and various audiovisual works. The watermark can be embedded in an audio or video stream. Such watermarks may represent information indicating that the content of the embedded watermark is never resolved, on a removable optical media, or that the content cannot appear on the removable optical medium in an unencrypted manner. For example, an unencrypted content on a recordable DVD disc can never be copied. "The video watermark may be illegal, and may also result in rejection of playback by the normal player. In another example, an audio watermark indicates that the content can only be Encrypted recording to prevent audio content from being recorded on CD-RW, re-writable DVDs or other types of optical disks. Digital watermarking typically requires a large amount of data to be checked before reliable detection is possible. The audio or video works that may occur for a few seconds or the works from which they are interpreted are “accumulated” and the detection is carried out on the accumulated data. The method of embedding data in copyrighted materials has been disclosed in international patent applications. In 99/45705, this document is incorporated herein by reference. The skilled person is well acquainted with the existing techniques (or watermarks) for embedding data, and the present invention is not related to embedded data technology, so no further information is available. In the actual implementation of the playback control and recording control in the environment, the inventors have found several problems related to the special operation of the PC driver, and The fact that the user can control the operation of the driver. The first problem discovered by the inventors is that the user can issue multiple "read," instructions to the driver in an attempt to bypass the playback control until a watermark (WM) is found. When the watermark has been found -4- This paper scale applies to the Chinese National Standard (CNS) A4 specification (210x 297 mm) 1289295 A7 B7 V. Invention description (2), "Read" is interrupted, the user can start from the same disk A new "read" instruction. This type of attack is possible because watermark detection requires reading a large amount of (seconds) of data. Similarly, for record control, a "write" command can be issued until the watermark is detected, but after the interruption, the method can be followed. The second problem discovered by the inventors is that the driver does not need to sequentially "read" or "write" audio and video information, but the driver can process the random portion of an audio video job in random order. - The third problem discovered by the inventors is that the interactive "read" and "write" actions of the short portion of the content may read or write the protected material, which is too short to detect the watermark. In a direct implementation, a driver requires a two-way watermark detector and is therefore expensive, or requires each read and write action to be set, thus causing the described hacking behavior. SUMMARY OF THE INVENTION The object of the present invention is to overcome the problems discovered by the inventors, and in particular the first problem, to avoid user law bypassing a copy protection mechanism, such as a watermark protecting the content and preventing it from illegally accessing the content. The object of the invention is achieved according to the method of claim 1, wherein the method comprises the steps of: - reading a unique identifier present in the information carrier, - using the identifier to be associated with the information carrier Information relating to illegal access operations is stored in the first memory, and access to the information carrier is denied after a predetermined number of illegal access operations. The invention is based on the concept of preventing multiple "reads" or multiple "writes" - illegal intrusion, a fact that can be utilized, ie information carriers such as recordable disks, having many unique numbers (ie CDs) -R, DVD-RAM, DVD-RW, DVD+RW), which can be used -5- This paper scale applies to Chinese National Standard (CNS) A4 specification (210 X 297 mm) 1289295 A7 B7 V. Description of invention Unique identifier. Each time an encounter - illegal reading or writing, this character is stored in the first memory t, which is preferably located in the PC driver. After N illegal actions (Nu), the drive may refuse to read data from the information carrier and/or write data to the information carrier. In this way, the first problem described by ± can prevent, gp, repeating a read or write command after extracting an error condition. It is only possible to repeatedly issue these instructions a limited number of times, so only limited data can be prevented from being illegally picked. Preferred embodiments of the invention are defined in the scope of the appended claims. According to a first preferred embodiment, a second memory storing an information carrier identifier that has been illegally accessed is used to check whether an identifier of the information carrier is stored therein. In this case, the number of illegal accesses that occur on the information carrier remains in the memory, and the number of times increases. When the identifier is not stored in the second memory, the number of illegal accesses that occur on the information carrier in the second memory is set to be consecutively registered in the first memory. Therefore, for each individual information carrier, a separate register is maintained in the second memory to be stored in the information carrier two times, so that it can be checked whether the individual information carrier can be accessed by the user or not. According to another preferred embodiment, the copy protection material stored in the embedded content in the information carrier is used to control access to the content. In particular, the watermark data is used as copy protection data which can be used by the watermark detector to check for an error condition, i.e., an illegal access action. The copy protection material contains information indicating how and how long the content of the information carrier can be copied and read, which can be written into the information. In general, any special access to _ can correct the copy protection data control. The proposed solution can be used for all but not limited to all PC media that can read or write data from the information carrier', especially the recordable or rewritable optical record carrier.

1289295 Δ7 Α7 Β7 五、發明説明(4 ) 體,如CD,DVD或DVR資訊載體。此種資訊載體通常載負一獨特號 碼,其可用作上述事例中之識別符。 在預定次數之非法存取行動後,資訊載體之存取被拒絕時,其 較佳僅許可將資訊載體重新格式化,俾任何被非法摘取之儲存内 容將被刪除。資訊載體,尤其是其識別符亦被自第二記憶體刪除 。或者,一較不強烈之方法中,在拒絕存取資訊載體之情形下’ 可以預見資訊載體未被接受,但自讀取裝置自動輸出^此時’資 訊載體之識別符將未自第二記憶體清除。 本發明亦關於一保護儲存於如申請專利範圍第7項之資訊載體 中之内容之裝置,其含一讀取單元,第一記憶體及一存取控制單 元。此外本發明亦關於一個人電腦及包含一如申請專利範圍第8 項之驅動機,一如申請專利範圍第9項之電腦程式及如申請專利範 圍第10項之資訊載體,以儲存如申請專利範園第9項之電腦程式。 本發明將配合圖式詳細說明,其中: 圖1說明誤差偵測後重複讀取行動問題, 圖2顯示本發明之裝置,及 圖3為一流程圖說明本發明之方法。 以舉例說明,以下說明在DVD “永不能複製”中一視頻水印之較 佳實施例 通常,一DVD PC驅動機僅瞭解“讀取指令+資料”及‘‘寫入指令+ 資料,,。此資料總在以32扇區(在視窗及大多其他操作系統之下) 之最大脈衝串之2KB(稱為扇區)之單元中發射。此意指驅動機迷 無視頻記錄器之大連續順序之概念。為此理由,如以“扇區’’, “讀取,,及“寫入,,而言,水印導線必須加以設計。 本紙張尺度通用中國國家標準(CNS) A4規格(210 X 297公釐) 1289295 A7 B7 五、發明説% 圖1說明由本發明解決之問題。圖示為一沿時間尺度(自頂部至 底部)由一PC及一DVD驅動機實施之行動以自磁碟(“媒體,,)讀取 資料。假定駭客企圖非法讀取儲存於可記錄磁碟之K扇區開始於扇 區#1^之内容。在i扇區之後,一水印偵測器發現一水印,構成厶檢 查條件(CCI:亦稱誤差訊息或感覺碼),其告知pc資料中奋^一水 印’其不允由磁碟讀取或寫入磁碟。結果,資料轉移被停止。之 後駿客可能企圖讀取扇區#况+丨至#以+1[。i扇區之後,偵測器再度-偵出水印,另一誤差訊息將送至PC。此舉可連續重複,即骇客軟 體持續活動發出至DVD驅動機多個讀取要求。因此,將駭客之自磁 碟之一小段,即約1秒中摘取所有資料變慢,因為水印彳貞測算法之 執行需要時間,實際上至少1秒,在此活動期間,驅動機發出非法 資料至PC 〇 圖2顯示本發明保護儲存於資訊載體中之内容之裝置。如圖 示,PC 1用來經驅動機2存取一資訊載體,此例中為磁碟3,驅動 機包括一保護儲存於磁碟3上之内容之裝置。應注意,驅動機2可 為一獨立設備如圖2所示,但亦可統合至pc J中%磁碟驅動機。 驅動機2包含其他知名元件但其與本發明無關,因此未示出,一 介面21至PC i,即一ATAPI介面,及一存取單元以以供存取磁碟 3 ’即供讀取磁碟3之資料或寫入至磁碟。介面21與存取單元㈣ 存取控制單元23以控制PC 1至磁碟3之存取,該磁碟適於在非法 存取行動時拒絕存取。該存取控制根據儲存於第—記憶額及第 二記憶體25之資料而控制。 在第二記‘It㈣中’資訊㈣之獨特識別符健存於其中,以前 曾發生非法存取於其上。因為光學磁碟每—均載有—獨特號碼可 -8-1289295 Δ7 Α7 Β7 V. Description of invention (4) Body, such as CD, DVD or DVR information carrier. Such information carrier typically carries a unique number that can be used as an identifier in the above examples. When the access to the information carrier is denied after a predetermined number of illegal access actions, it is preferred to only reformat the information carrier, and any illegally extracted storage content will be deleted. The information carrier, and in particular its identifier, is also deleted from the second memory. Or, in a less powerful method, in the case of refusing to access the information carrier, it can be foreseen that the information carrier is not accepted, but the self-reading device automatically outputs ^ at this time, the identifier of the information carrier will not be from the second memory. Body removal. The invention also relates to a device for protecting the content stored in the information carrier of claim 7 of the patent application, comprising a reading unit, a first memory and an access control unit. In addition, the present invention also relates to a personal computer and a computer including the driver of the application of the scope of the patent application, as in the application of the computer program of claim 9 and the information carrier of claim 10 of the patent application, for storage as a patent application. The computer program of the 9th item of the park. DETAILED DESCRIPTION OF THE INVENTION The present invention will be described in detail with reference to the drawings in which: Figure 1 illustrates the problem of repeated reading actions after error detection, Figure 2 shows the apparatus of the present invention, and Figure 3 is a flow chart illustrating the method of the present invention. By way of example, the following illustrates a preferred embodiment of a video watermark in a DVD "Never Copy". Typically, a DVD PC driver only knows "read command + data" and "write command + data,". This data is always transmitted in units of 2 KB (called sectors) of the largest burst of 32 sectors (under Windows and most other operating systems). This means that the driver has no concept of a large sequential order of video recorders. For this reason, such as "sector", "read," and "write,", the watermark wire must be designed. This paper scale is commonly used in China National Standard (CNS) A4 specification (210 X 297 mm) 1289295 A7 B7 V. Inventions Figure 1 illustrates the problem solved by the present invention. The illustration shows a behavior implemented by a PC and a DVD drive along a time scale (from top to bottom) to a self-disc ("media, ,) read the data. It is assumed that the hacker attempts to illegally read the contents of the sector #1^ starting from the K sector stored on the recordable disk. After the i sector, a watermark detector finds a watermark, which constitutes a check condition (CCI: also known as an error message or a sensory code), which informs the pc data that the watermark is not allowed to be read by the disk or Write to disk. As a result, the data transfer was stopped. After that, the passenger may attempt to read the sector #况+丨 to # to +1[. After the i sector, the detector again detects the watermark and another error message is sent to the PC. This can be repeated continuously, that is, the hacker software continues to be active to issue multiple read requests to the DVD drive. Therefore, it is slow to pick up all the data from a small segment of the hacker, that is, about 1 second, because the execution of the watermark detection algorithm takes time, actually at least 1 second, during which the driver sends out Illegal data to the PC Figure 2 shows the device for protecting the content stored in the information carrier. As shown, the PC 1 is used to access an information carrier via the drive unit 2, in this case a disk 3, the drive including a device for protecting the content stored on the disk 3. It should be noted that the drive unit 2 can be a stand-alone device as shown in FIG. 2, but can also be integrated into the % J disk drive machine in PC J. The driver 2 includes other well-known components but is not related to the present invention, and thus is not shown, an interface 21 to PC i, that is, an ATAPI interface, and an access unit for accessing the disk 3' for reading magnetic The information of the disc 3 is written to the disc. The interface 21 and the access unit (4) access control unit 23 to control the access of the PC 1 to the disk 3, the disk being adapted to deny access during an illegal access operation. The access control is controlled based on the data stored in the first memory amount and the second memory 25. The unique identifier of the information (4) in the second ‘It(4)) is stored in it, and illegal access has previously occurred to it. Because the optical disk is loaded with - unique number -8-

1289295 、發明説叼(β 作為識別符,第二記憶體25儲存Μ個該號碼,其上,登記有一誤差 條件如‘‘非法水印,,感覺碼。 在第一記憶體24中,其被分為數個記憶體單元,每一單元指定 給儲存於第二記憶體25中之識別符,發生在登記在第二記憶體25 中之特殊磁碟之非法存取次數被儲存。此數目由存取控制單元23 以可允許之非法存取之預定數目加以檢查。 本發明現在將參考圖3作較詳細說明,圖3顯示本發明方法之流-程圖。在插入磁碟(步驟S1)及讀取識別符iD(s2)即獨特號碼之後 ’首先檢查(S3)識別符是否在儲存於第二記憶體25之表中 如否 ’凊求之存取’即讀取或寫入指令被接受(S4)及執行(S5)。如在 執行期間,無非法水印出現(S6),繼續接受及執行之進一步指令 直到已無進一步指令被收到為止。 如一非法水印情況在步驟S6出現,如識別符儲存於第二記憶體 25,應順序檢查(S7)。在正面情況下,第一記憶鱧24中之對應攔 即計數器[ID]增量1(S8)。如非法存取行動之次數,即該計數不 超過可允許非法行動(S9)之預定數目N,進一步之指令將被接受 及執行(S4,S5),否則磁碟之存取即被拒絕。 如步驟S7中,偵出一非法水印情況後,發現該特殊磁碟之識別 符尚未儲存於第二記憶體25之中,在檢查後發現識別符之上限數 目Μ已在第二記憶體25(S10)中時,ID將儲存其中(S12),此情形 時’一識別符將自表中(S11)消除,亦即,一隨機欄或表中最久 之攔將被消除,及以現在之識別符(S12)取代。此外,該識別符-之非法行動之對應計數已設定為〇(Sl3)。以步驟(S8)繼續處理。 如在步驟S3之開始時,應被存取之資訊載體之識別符被發現已 -9- 本紙張尺度適用中國國家標準(CNS) A4規格(210X 297公釐)1289295, the invention says β (β as an identifier, the second memory 25 stores the number, on which an error condition such as ''illegal watermark, sensation code' is registered. In the first memory 24, it is divided For a plurality of memory cells, each cell is assigned to an identifier stored in the second memory 25, and the number of illegal accesses occurring on the special disk registered in the second memory 25 is stored. The control unit 23 checks with a predetermined number of allowable illegal accesses. The present invention will now be described in greater detail with reference to Figure 3, which shows a flow diagram of the method of the present invention. Inserting a disk (step S1) and reading After the identifier iD (s2), that is, the unique number, the first check (S3) identifier is stored in the table of the second memory 25, if no 'access request', that is, the read or write command is accepted ( S4) and execution (S5). If during execution, no illegal watermark appears (S6), further instructions continue to be accepted and executed until no further instructions have been received. If an illegal watermark occurs in step S6, such as an identifier Stored in second Recalling the body 25, it should be checked sequentially (S7). In the front case, the corresponding counter in the first memory port 24 is incremented by 1 (S8). If the number of illegal access actions is not exceeded, the count does not exceed A predetermined number N of illegal actions (S9) may be allowed, and further instructions will be accepted and executed (S4, S5), otherwise the disk access is rejected. In step S7, after detecting an illegal watermark, it is found The identifier of the special disk has not been stored in the second memory 25. After the check, it is found that the upper limit number of the identifier is already in the second memory 25 (S10), and the ID will be stored therein (S12). In the case of 'the identifier will be removed from the table (S11), that is, the longest bar in a random column or table will be eliminated, and replaced by the current identifier (S12). In addition, the identifier - illegal The corresponding count of actions has been set to 〇 (Sl3). The process continues with step (S8). If at the beginning of step S3, the identifier of the information carrier to be accessed is found -9- This paper size applies to China Standard (CNS) A4 size (210X 297 mm)

裝 訂 線Binding line

1289295 A7 B7 五、發明説明(j ) "~" - 在第二記憶體25之中時,此時已檢查該特殊資訊載體之非法行動 是否已超過預動可數目N(S14)。如此一檢查為否定,請求指人將 被接受及執行(S4,S5),如肯定時,僅有指令“格式,,單元被接受 (S15, S16),即至磁碟之存取請求被拒絕,此磁碟被格式化(§17) ,及該特殊識別符之對應之計數自第二記憶體25中刷新。此後, 進一步指令將被接受及執行(S4,S5)。 應注意’允許之合法行動之預定數目N應足夠小,俾可被(非法) 複製之資料量不超過數分鐘。但數目N應夠大以克服資料處理路徑 中之延遲,特別是GUI,0S與驅動機間之路徑。用戶應給一機會以 “懺悔”其非法行動及消除非法摘取之資料。 根據一較佳實施例,利用以下之水印偵測策略。資料軀動機將 ‘‘累加”其所遇之所有含DVD視頻之扇區,不論此扇區係在讀取或寫 入行動中所轉移者。此一累加將繼續,直到有足夠之資料以實施 水印偵測。此累加階段由分析階段跟隨。如分析發現一水印之青 疋辨認’於是驅動機必須以某方式回輸至用戶。如磁碟為一可記 錄磁碟’驅動機必須記住其獨特磁碟id。此獨特磁碟id必須在驅 動機之快速記憶體中與一數字“ n,,耦合,該數字代表水印在磁碟上 發現之次數。如此數字大於“N”,該磁碟之所有讀取及寫入行動將 被終止一段時間。此時間為何,受數因素之影響:驅動機可記憶之 磁碟數及軀動機上次完全閃光之時間。任何情形下,數字“N”(實 際值為10)大小,用戶無法暗地複製數分鐘之電影,但足夠大以使 用戶刪除其自磁碟所有非法材料及其合法材料。用戶可使一磁碟 可再用之唯一方法為,其申in>=N,令驅動機成功的執行一“格 式化單元指令。磁碟再格式化後,驅動機必須自其非法磁碟表中 -10-1289295 A7 B7 V. INSTRUCTION DESCRIPTION (j) "~" - In the second memory 25, it has been checked at this time whether the illegal action of the special information carrier has exceeded the pre-action number N (S14). If such a check is negative, the request means that the person will be accepted and executed (S4, S5). If affirmative, only the instruction "format, the unit is accepted (S15, S16), that is, the access request to the disk is rejected. The disk is formatted (§17), and the corresponding count of the special identifier is refreshed from the second memory 25. Thereafter, further instructions are accepted and executed (S4, S5). It should be noted that 'allowed The predetermined number N of legal actions should be small enough that the amount of data that can be (illegally) copied does not exceed a few minutes. However, the number N should be large enough to overcome the delay in the data processing path, especially between the GUI, OS and the driver. The user should give an opportunity to "repent" their illegal actions and eliminate illegally extracted information. According to a preferred embodiment, the following watermark detection strategy is utilized. The data body will 'accumulate' all that it encounters. A sector containing a DVD video, regardless of whether the sector was transferred during a read or write operation. This accumulation will continue until there is enough data to implement the watermark detection. This accumulation phase is followed by the analysis phase. If the analysis finds that a watermark is recognized, then the driver must be returned to the user in some way. If the disk is a recordable disk, the drive must remember its unique disk id. This unique disk id must be coupled to a number "n," in the flash memory of the drive, which represents the number of times the watermark was found on the disk. This number is greater than "N", all reads of the disk and The write action will be terminated for a period of time. What is the reason for this time is affected by the number of disks: the number of disks that the drive can remember and the time when the body was completely flashed. In any case, the number "N" (actual value is 10) The size, the user can't copy the movie for a few minutes, but it is big enough for the user to delete all the illegal materials and their legal materials from the disk. The only way for the user to make a disk reusable is to apply in > =N, let the driver successfully execute a "format unit command. After the disk is reformatted, the driver must be from its illegal disk table. -10-

1289295 五、發明説明ds 消除該磁碟nwx此方式1戶可恢復討法磁磾。 件親拍動署機可新回咸檢臀用磁戶發現一㈣之方法為’由堪動機發出一“檢查條 件並置-新感覺碼於感覺緩衝器中’以告知 已偵出”。之後,堪動機可選擇實施-‘‘出托盤,,或暫停,= 楚瞭解已發生錯誤,其轉移㈣已巾Μ 此較佳實施例可概述如下: (累加階段:) -驅動機累加視頻資訊之扇區,不論其讀取或寫人之順序, 媒動機累加所有轉移之諸之扇區,含讀取及寫入, -媒動機累加直到其有足夠資料供分析階段之用 (分析階段:) -如债出“永不能複製,時,媒動機應檢查磁碟11}是否存在 於記憶體中’否則其應建立—攔,此情行下,“Η”小 -對應之“η”應增量, -PC驅動機應選擇實施“出托盤,,(即將磁碟自驅動機移出)或 暫停, -如η >=‘‘N,’,則不允許讀取或寫入行動,僅SCSI指令 FORMAT UNIT”可,驅動機應發出“檢查條件,,至主機並置 “永不能複製WM”於感覺緩衝器(“感覺緩衝器,,為驅動機送 至主機之資訊以響應SCSI指令“REQUEST SENSE”)。 磁碟插入後,磁碟應檢查磁碟ID,檢查其是否出現於記憶體中 之資料庫中。如其已在資料庫中,及“11,,> = ‘1,,時,將採上述行-動0 -11- 本紙張尺度適用中國國家標準(CNS) A4規格(210X297公釐)1289295 V. Invention Description ds Eliminate the disk nwx This way, one household can recover the magnetic file. A pro-fighting machine can be used to detect a (4) method by issuing a “check condition juxtaposition-new feeling code in the sensory buffer” to inform the detected. After that, the driver can choose to implement - ''out of the tray, or pause,= Chu understands that an error has occurred, and its transfer (4) has been omitted. The preferred embodiment can be summarized as follows: (accumulation stage:) - drive machine accumulates video information Sectors, regardless of the order in which they are read or written, the mediator accumulates all sectors of the transfer, including reads and writes, - the mediator accumulates until it has sufficient data for the analysis phase (analysis phase: ) - If the debt is "can never be copied, the media should check the disk 11} whether it exists in the memory or else it should be established - the bar, in this case, the "Η" is small - the corresponding "η" should Incremental, -PC driver should choose to implement "out tray, (ie, the disk is moved out of the drive) or pause, - such as η >=''N, ', does not allow reading or writing action, only SCSI command FORMAT UNIT", the driver should issue "check conditions, to the host concatenation "never copy WM" in the sensor buffer ("sense buffer, for the driver to send information to the host in response to SCSI command" REQUEST SENSE"). After the disk is inserted, the disk Check the disk ID and check if it appears in the database in the memory. If it is already in the database, and "11,,> = '1,, the above line will be taken - 0 -11- The paper scale applies to the Chinese National Standard (CNS) A4 specification (210X297 mm)

Claims (1)

.一種保護儲存於資訊載體中資訊之内容之方法人 -讀取在該資訊載體中之獨特識別符,,3下列步驟··A method for protecting the content of information stored in an information carrier - reading a unique identifier in the information carrier, 3 following steps •利用_別符’儲存與該資 資訊於第—記憶體, ^存取仃動有關之 .在非法存特動預絲目後,拒 2_如申請專咖第1項之方H㈣d存取° -檢查該識別符是否儲存 π · 曾發生非法心、 该記憶體係儲存 日發生非法存取仃動之資訊賴之識別符,及 -2法存取行動發生,如該勤削切存 ;:第或增加之非法存取行動發生於該資訊載體ί::: 存於第-記‘_之_符儲存於第二記憶體卜將储 3.如申請專利範圍第!項之方法,進一步包含下列步驟. -讀取複製㈣資料,特別是儲存於資訊載體中嵌 中之水印資料, -根據讀取之複製保護資料控制對内容之存取。 4·如申請專利範圍第1項之方法, 其中該資訊載體為-光學記錄載體,特別是—可記綠或 入之光學記錄載體,及 其中該識別符包含一儲存於光學記錄載體中之獨特號碼。 5.如申請專利範圍第2項之方法,進一步含下列步驟: -在非法存取行動之預定數目後拒絕對該資訊載體存取時 ,格式化該資訊載體,及 •自該第二記憶體消除該資訊載體之識別符。 6·如申請專利範圍第2項之方法, 本紙張尺度適用中國國家標準(CNS) Α4規格(210 X 297公釐) A BCD 1289295 六、申請專利範圍 其中該第一及第二記憶體為用以存取該資訊載體之PC驅動 機之一部分。 7. —種用以保護儲存於資訊載體中内容之裝置,包含: -一讀取單元,供讀取在資訊載體中之獨特識別符, -一第一記憶體,利用該識別符供儲存與在該資訊載體上發 生之非法存取行動有關之資訊, -一存取控制單元,供在預定數目之非法存取行動後,拒絕 存取該資訊載體。 8. —種個人電腦,包含一驅動機以存取一資訊載體,該驅動機包 含保護根據申請專利範圍第7項之該資訊載體中之内容之裝 置。 9. 一種資訊記錄媒體,儲存有電腦程式,以執行如申請專利範圍 第1至6項之任一方法之步驟。 本紙張尺度適用中國國家標準(CNS) A4規格(210X 297公釐)• Use _ 符 ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ° - Check if the identifier stores π · Illegal heart, the identifier of the illegal access to the memory on the memory system, and the -2 access action, such as the diligent cut; The first or added illegal access action occurs in the information carrier ί::: stored in the first record '_ _ _ stored in the second memory will be stored 3. As claimed in the scope of the patent! The method of the item further comprises the following steps: - reading the copy (4) data, in particular the watermark data embedded in the information carrier, - controlling access to the content according to the read copy protection data. 4. The method of claim 1, wherein the information carrier is an optical record carrier, in particular, a green or incorporated optical record carrier, and wherein the identifier comprises a unique one stored in the optical record carrier number. 5. The method of claim 2, further comprising the steps of: - formatting the information carrier when the access to the information carrier is denied after a predetermined number of illegal access operations, and • from the second memory Eliminate the identifier of the information carrier. 6. If the method of applying the second paragraph of the patent scope is applied, the paper scale is applicable to the Chinese National Standard (CNS) Α4 specification (210 X 297 mm). A BCD 1289295 6. Patent application scope, wherein the first and second memory are used To access a portion of the PC driver of the information carrier. 7. A device for protecting content stored in an information carrier, comprising: - a reading unit for reading a unique identifier in the information carrier, - a first memory, using the identifier for storage and Information relating to illegal access actions occurring on the information carrier, an access control unit for denying access to the information carrier after a predetermined number of illegal access actions. 8. A personal computer comprising a driver for accessing an information carrier, the driver comprising means for protecting the content of the information carrier according to item 7 of the patent application. 9. An information recording medium storing a computer program for performing the steps of any of the methods of claims 1 to 6. This paper scale applies to the Chinese National Standard (CNS) A4 specification (210X 297 mm)
TW091117882A 2001-07-06 2002-08-08 Method for protecting content stored on an information carrier TWI289295B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0116496A GB0116496D0 (en) 2001-07-06 2001-07-06 Method for protecting content comprising embedded data in a drive
EP02075293 2002-01-24

Publications (1)

Publication Number Publication Date
TWI289295B true TWI289295B (en) 2007-11-01

Family

ID=26077594

Family Applications (1)

Application Number Title Priority Date Filing Date
TW091117882A TWI289295B (en) 2001-07-06 2002-08-08 Method for protecting content stored on an information carrier

Country Status (6)

Country Link
US (1) US20040172563A1 (en)
EP (1) EP1412945A1 (en)
JP (1) JP2004534349A (en)
KR (1) KR20030029904A (en)
TW (1) TWI289295B (en)
WO (1) WO2003005358A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7761927B2 (en) * 2005-09-21 2010-07-20 Rovi Solutions Limited Apparatus and method for monitoring and controlling access to data on a computer readable medium
US9767823B2 (en) * 2011-02-07 2017-09-19 Qualcomm Incorporated Devices for encoding and detecting a watermarked signal

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2618000B1 (en) * 1987-07-07 1989-11-03 Schlumberger Ind Sa ANTI-FRAUD METHOD AND DEVICE FOR A SELECTIVE ACCESS SYSTEM
JP2867720B2 (en) * 1991-01-24 1999-03-10 日本電気株式会社 Mechanism and method for preventing unauthorized access to ROM incorporated in radio selective call receiver
JP4095680B2 (en) * 1994-08-01 2008-06-04 富士通株式会社 Security management method for card type storage device and card type storage device
JP2970739B2 (en) * 1994-09-30 1999-11-02 日本ビクター株式会社 Optical disc playback control method
JP4456185B2 (en) * 1997-08-29 2010-04-28 富士通株式会社 Visible watermarked video recording medium with copy protection function and its creation / detection and recording / playback device
EP0984346A1 (en) * 1998-09-02 2000-03-08 Hitachi Europe Limited Copy protection apparatus and method
US6868497B1 (en) * 1999-03-10 2005-03-15 Digimarc Corporation Method and apparatus for automatic ID management
KR100365353B1 (en) * 2000-04-11 2002-12-18 엘지전자 주식회사 Compact disc recordable player having means of copy protection and copying method thereof
EP1209551B1 (en) * 2000-11-28 2013-02-13 International Business Machines Corporation System and method of preventing unauthorized access to computer resources

Also Published As

Publication number Publication date
US20040172563A1 (en) 2004-09-02
WO2003005358A1 (en) 2003-01-16
JP2004534349A (en) 2004-11-11
EP1412945A1 (en) 2004-04-28
KR20030029904A (en) 2003-04-16

Similar Documents

Publication Publication Date Title
USRE43517E1 (en) Recording and reproducing apparatus having copy-protection function and method thereof
JP3796858B2 (en) Optical disk reading device
TWI394149B (en) Virtual write protection system
TW561476B (en) A recordable optical disk
TWI289295B (en) Method for protecting content stored on an information carrier
KR100275870B1 (en) Disk capable of restricting copying and the restricting method
TWI352343B (en) Recording/reproduction apparatus, recording reprod
JP4319984B2 (en) Copying apparatus for copying recording medium, method thereof, and computer program thereof
TWI238383B (en) Method for protecting content stored on an information carrier
TWI272581B (en) Optical disk drive, optical disk, security control method for optical disk drive
JP3617812B2 (en) Information reproducing apparatus and information reproducing method
TW381260B (en) Optical disk reproducing device
JP2006522392A (en) Optical media protection driver
JP2006004376A (en) Information reproducing device
JP4095914B2 (en) Information recording apparatus, information recording method, information recording medium, information reproducing apparatus, and information reproducing method
TWI393125B (en) Information recording method and device, information recording medium, and manufacturing method and device of information recording medium
JP3618663B2 (en) Information recording / reproducing apparatus, information recording / reproducing medium used therefor, and host apparatus of information recording / reproducing apparatus
JP2012068809A (en) Storage device
JP2000331419A (en) Recording medium which prevents the use of unlawfully duplicated program or data on computer
JP2002230907A (en) Information reproducing device and information reproducing method, and program
JP2009543262A (en) Recording medium and data recording / reproducing method and apparatus
JP2004110956A (en) Preventing method for illegal copy of cd-rom and cd-rom which prevents its illegal copy
JP2005032332A (en) Optical disk and program for utilizing its recorded information
JP2002190157A (en) Recording medium, recording/reproducing apparatus, and recording/reproducing method
JP2004164777A (en) Program with illegal copy discriminating function, and recording medium recording the program

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees